Browse > Article
http://dx.doi.org/10.9708/jksci.2018.23.12.081

The Security Architecture for Secure Cloud Computing Environment  

Choi, Sang-Yong (Cyber Security Research Center, Korea Advanced Institute of Science and Technology)
Jeong, Kimoon (HPC Cloud Center, Korea Institute of Science and Technology Information)
Abstract
Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.
Keywords
Cloud computing; Access Control; Security Architecture; Security Threats; Cloud Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 DEMPSEY, David; KELLIHER, Felicity. Industry Trends in Cloud Computing. 2018.
2 JOSHI, N.; SHAH, S. A Comprehensive Survey of Services Provided by Prevalent Cloud Computing Environments. In: Smart Intelligent Computing and Applications. Springer, Singapore 2019, pp. 413-424, 2018.
3 https://cloud.google.com/security/security-design/
4 https://aws.amazon.com/security/
5 https://gov.ucloudbiz.olleh.com/portal/ktcloudportal.epc.productintro.waf.html
6 https://cloud.naver.com
7 Cloud Security Alliance, "The Treacherous 12 CloudComp uting Top Threats in 2016," Security, no. February, pp. 1-34, 2016.
8 M. Kazim and S. Zhu, "A Survey on Security Threats in CloudComputing Technology," Int. J. Res., vol. 1, no. 8, pp. 1071-1081, 2015.
9 G. Aswini and R. Mervin, "A Survey on Cloud Security Issuesand Techniques," Int. J. Comput. Sci. Appl., vol. 4, no. 1, pp.125-132, 2016.   DOI
10 https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
11 PARK, Jae-Kyung; LEE, Won Joo; LEE, Kang-Ho. A Study on the Isolated Cloud Security Using Next Generation Network. Journal of The Korea Society of Computer and Information, Vol. 22, No. 11, pp. 9-16, 2017.   DOI
12 VARGHESE, Blesson; BUYYA, Rajkumar. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, pp. 849-861, 2018.